Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12652
HistoryMay 13, 2006 - 12:00 a.m.

US-CERT Technical Cyber Security Alert TA06-132B -- Apple QuickTime Vulnerabilities

2006-05-1300:00:00
vulners.com
2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                 National Cyber Alert System

           Technical Cyber Security Alert TA06-132B

Apple QuickTime Vulnerabilities

Original release date: May 12, 2006
Last revised: –
Source: US-CERT

Systems Affected

Apple QuickTime on systems running

 * Apple Mac OS X
 * Microsoft Windows

Overview

Apple QuickTime contains multiple vulnerabilities. Exploitation of
these vulnerabilities could allow a remote attacker to execute
arbitrary code or cause a denial-of-service condition.

I. Description

Apple QuickTime 7.1 resolves multiple vulnerabilities in the way
different types of image and media files are handled. An attacker
could exploit these vulnerabilities by convincing a user to access
a specially crafted image or media file with a vulnerable version
of QuickTime. Since QuickTime configures most web browsers to
handle QuickTime media files, an attacker could exploit these
vulnerabilities using a web page.

For more information, please refer to the Vulnerability Notes.

II. Impact

The impacts of these vulnerabilities could allow an remote,
unauthenticated attacker to execute arbitrary code or commands, and
cause a denial-of-service condition. For further information,
please see the Vulnerability Notes.

III. Solution

Upgrade

Upgrade to QuickTime 7.1. This and other updates for Mac OS X are
available via Apple Update.

Disable QuickTime in your web browser

An attacker may be able to exploit this vulnerability by persuading
a user to access a specially crafted file with a web
browser. Disabling QuickTime in your web browser will defend
against this attack vector. For more information, refer to the
Securing Your Web Browser document.

Appendix A. References

 * Vulnerability Notes for QuickTime 7.1 -
   <http://www.kb.cert.org/vuls/byid?searchview&query=QuickTime_7.1>
 
 * Securing Your Web Browser -
   <http://www.us-cert.gov/reading_room/securing_browser/>
 
 * About the security content of the QuickTime 7.1 Update -
   <http://docs.info.apple.com/article.html?artnum=303752>
 
 * Apple QuickTime 7.1 -
   <http://www.apple.com/support/downloads/quicktime71.html>
 
 * Standalone Apple QuickTime Player -
   <http://www.apple.com/quicktime/download/standalone.html>
 
 * Mac OS X: Updating your software -
   <http://docs.info.apple.com/article.html?artnum=106704>

The most recent version of this document can be found at:

 <http://www.us-cert.gov/cas/techalerts/TA06-132B.html>

Feedback can be directed to US-CERT Technical Staff. Please send
email to <[email protected]> with "TA06-132B Feedback VU#289705" in the
subject.


For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html&gt;.


Produced 2006 by US-CERT, a government organization.

Terms of use:

 &lt;http://www.us-cert.gov/legal.html&gt;

Revision History

May 12, 2006: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRGT7JH0pj593lg50AQI2Uwf/U3zGDrR8UkWK4ry6AYMS7HPMdbiF6Vmo
9gP9Luc6Kj8zzxCWhnNKNzEq2P0B1oD03WcPFaIPnwvQJGApeUDRimyhQj8RDjME
yAUt/reWG7RZ0Z2w/qaiZP7pQ7SjyIUKkN2OCG8LMmGKqsiCdFXoss/Bu0yFMH11
uvgwibfvkOdRLAPmRTVWk+gJEAdw3xFySm9r92qmig6CxKi7GAIpi9Gf7MXcRsKg
oG3y5f06Kiq8ACYszPKneHE7WNvLP1ewuaWmf7PHiNebAB+W5hfwA2yEh6e6PSV2
eBi5cpigfXBrsjXk4L7wYrD8UcRl7nN8iqzWpMwYJkSloUmcYL1BBg==
=LsFu
-----END PGP SIGNATURE-----